Analysis
-
max time kernel
301s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2023, 22:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/madrisan/wtmpclean.git
Resource
win10v2004-20230703-en
General
-
Target
https://github.com/madrisan/wtmpclean.git
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133344519075232188" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2432 chrome.exe 2432 chrome.exe 3028 chrome.exe 3028 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2432 chrome.exe 2432 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1136 2432 chrome.exe 44 PID 2432 wrote to memory of 1136 2432 chrome.exe 44 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 3836 2432 chrome.exe 85 PID 2432 wrote to memory of 2260 2432 chrome.exe 86 PID 2432 wrote to memory of 2260 2432 chrome.exe 86 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87 PID 2432 wrote to memory of 2208 2432 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/madrisan/wtmpclean.git1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe9a1e9758,0x7ffe9a1e9768,0x7ffe9a1e97782⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1816,i,6274838787035784844,11010686878293688492,131072 /prefetch:22⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1816,i,6274838787035784844,11010686878293688492,131072 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1816,i,6274838787035784844,11010686878293688492,131072 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1816,i,6274838787035784844,11010686878293688492,131072 /prefetch:12⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1816,i,6274838787035784844,11010686878293688492,131072 /prefetch:12⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1816,i,6274838787035784844,11010686878293688492,131072 /prefetch:82⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1816,i,6274838787035784844,11010686878293688492,131072 /prefetch:82⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2412 --field-trial-handle=1816,i,6274838787035784844,11010686878293688492,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e772bf6e3e2d50cf2fd0881bbc3dd98e
SHA12b58cdfff05a3a2b18ac6efe75bc5e9851dabab0
SHA2567646136db9fdec4c52afb3f0fd684ca78a0b0634d6deffcd2c572a5ea36e4ad9
SHA5128419d2058df711f6191b0bd55df3aab34eb6e652054649c7500386f3c5df64f3d7d24043ac066f0082a963a38a26fd91d3dea565e1aa3ecba511c3b134f1fb4b
-
Filesize
1KB
MD58548093ef6d4ef01d9ed29b6ebe81a27
SHA1d8976a15a930b4a2a86a261d99bdb9d7f1853bcf
SHA2563083980d428d1666f070a388c657fe65426523106b865e474d4cc64999e6b7f4
SHA512aec0677c43c2fa136d4c6f981454476dc5e731fb043919477847c5cc0805ebe17688b33645579aa53d597f87e2ea7bf7d41ba138df4d7c3445fb37d82917584e
-
Filesize
1KB
MD5e6cd6ccfb0a58e64f4ddb3f686c01b00
SHA1f77cdf9a446d913c328ca718b70bd284ab6ea02a
SHA256d3396e1971d6d3fd6d5345febe90833f68ebaf1e7e5dc3abe902adfc9f1d5b71
SHA5127d8d51779b6ea1034b9dfbb681c8a8d071816268caf3900a946972b34ac439fe1ed139cb243734098b384d316b70858ba3efb13c62c193df7bc14652b2873441
-
Filesize
5KB
MD5a5553cda36eaad5ce0be0d0796e2f39f
SHA1bb794729b46013fc772272dbff99650f4ef8ade9
SHA2563272722cc026d16aab5e0abd07ef72a7e3a78177ba71db08cc864885995a7f34
SHA512aaced9e6c0b7486103130f679dbcf31194386ac56595ab67c55b62c76d7a253465bc436d0523cd7e2aa6d3dff1a6a17731adfe454564cfe8eebf3caf5865d05a
-
Filesize
5KB
MD5a881bf28d36fc52228e307fca07ac1fa
SHA1191c137ffcae6b808955335957c32f4d43f94053
SHA256943a20899ca559da084df207c8888c98390fe96b7e85ca066c29e71236c5a7ba
SHA51280312cf4eae8d8476583eac39efd1944b82f036101f9adb61af3b41153c09a51d3357edf4b2aa3d5e2ea7effba06d8c1a26334e7235033ef67fa1810920db14e
-
Filesize
6KB
MD5212c00cf750497a9f7fad45a9d8c9cb9
SHA185620728ed717a54dd0c8a1c3dc35fcf894ad9d3
SHA2566b11cad25b2da26933a79dfe85ec657fb9b913492f8a9be895e716914b574ae7
SHA51267a0a4e9de5f45d8442a3afbac268425fcb3d9e4d10444b1f51698a26e01909106e2c6b87304654743335902f9635f979951752d4cf9fe9997424020ed96d1af
-
Filesize
87KB
MD5305606b9bfcf6315a6f47005454a1eb5
SHA142447943d167b7d772f9f9815e485a3c0c813902
SHA2568b46c61633c3ca89eb76d54c4fafdfc86ef2681586e2067205cd5641067a3215
SHA512e8926765049cfafc8d8054aa877d5578365b0f4cc21e5bbb7b19c14a9a73be6daca2f0779fa2eb96b6ba5d32fea57409793df5e1d12b9995eb0fb6a891dacd9e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd